Guide_3DS/_pages/pt_BR/Decrypt9-(Browser).txt
2017-01-16 09:31:21 -05:00

32 lines
No EOL
1.7 KiB
Text

---
title: "Decrypt9 (Browser)" #
lang: en
permalink: /decrypt9-(browser).html
---
The first thing this guide will do is get you running Decrypt9, which is a multipurpose toolkit that will allow us to install the version 2.1.0, which contains a vulnerability that is needed for further exploitation of the system.
{: .notice}
Se você já hackeou seu 3DS antes e tem um CFW baseado em EmuNAND, esse guia lida exclusivamente com a SysNAND e você deve seguir todas as instruções que servem para a SysNAND. Note que os termos EmuNAND e RedNAND se referem a implementações ligeiramente diferentes do [mesmo conceito] (http://3dbrew.org/wiki/NAND_Redirection).
{: .notice--info}
#### O que você precisa
* The latest release of [Decrypt9WIP](https://github.com/d0k3/Decrypt9WIP/releases/)
#### Instructions
1. Create a folder named `files9` on the root of your SD card if it does not already exist
2. Copy `Launcher.dat` and `Decrypt9WIP.dat` from the Decrypt9WIP `.zip` to the root of your SD card
3. Reinsert your SD card into your 3DS
4. Open the browser and go to one of the following URLs on your 3DS
+ `https://dukesrg.github.io/?Decrypt9WIP.dat`
+ `http://go.gateway-3ds.com/`
+ `http://www.reboot.ms/3ds/load.html?Launcher.dat`
+ `http://dukesrg.dynu.net/3ds/rop?GW17567.dat&Launcher.dat`
+ Make sure to try each URL if the first one doesn't work (some versions cannot use the first one, and some versions cannot use the last three)
+ If you get an error, [follow this troubleshooting guide](troubleshooting#ts_browser)
5. If the exploit was successful, you will have booted into Decrypt9
Continuar para [ctrtransfer para 2.1.0](2.1.0-ctrtransfer).
{: .notice--primary}